IOC Report
osk[1].exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\osk[1].exe
"C:\Users\user\Desktop\osk[1].exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF6F6069000
unkown
page readonly
49D20F9000
stack
page read and write
7FF6F605F000
unkown
page read and write
1CE063C0000
heap
page read and write
7FF6F604D000
unkown
page read and write
7FF6F6011000
unkown
page execute read
7FF6F6042000
unkown
page readonly
1CE06570000
heap
page read and write
1CE06280000
heap
page read and write
7FF6F6010000
unkown
page readonly
7FF6F6010000
unkown
page readonly
1CE063A0000
heap
page read and write
7FF6F6069000
unkown
page readonly
1CE062AA000
heap
page read and write
7FF6F606D000
unkown
page readonly
7FF6F6011000
unkown
page execute read
7FF6F606D000
unkown
page readonly
7FF6F604D000
unkown
page write copy
7FF6F6042000
unkown
page readonly
1CE061A0000
heap
page read and write
1CE062A0000
heap
page read and write
There are 11 hidden memdumps, click here to show them.